[HTML][HTML] Transparency in persuasive technology, immersive technology, and online marketing: Facilitating users' informed decision making and practical implications

R Wang, R Bush-Evans, E Arden-Close, E Bolat… - Computers in Human …, 2023 - Elsevier
In the current age of emerging technologies and big data, transparency has become an
important issue for technology users and online consumers. However, there is a lack of …

Leaky forms: A study of email and password exfiltration before form submission

A Senol, G Acar, M Humbert, FZ Borgesius - 31st USENIX Security …, 2022 - usenix.org
Web users enter their email addresses into online forms for a variety of reasons, including
signing in or signing up for a service or subscribing to a newsletter. While enabling such …

Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing

G Rodríguez-Galán, J Torres - Annals of Telecommunications, 2024 - Springer
Cross-site scripting (XSS) attacks pose a significant threat to the security of web
applications, as they compromise personal information by stealing cookies. This study …

A fait accompli? an empirical study into the absence of consent to {Third-Party} tracking in android apps

K Kollnig, P Dewitte, M Van Kleek, G Wang… - … Symposium on Usable …, 2021 - usenix.org
Third-party tracking allows companies to collect users' behavioural data and track their
activity across digital devices. This can put deep insights into users' private lives into the …

Defending novice user privacy: An evaluation of default web browser configurations

K Radivojevic, N Clark, A Klempay, P Brenner - Computers & Security, 2024 - Elsevier
Cyber novices often enter sensitive data into web browsers for routine activities such as
online shop** and bill payments, making them targets for malicious entities, including …

The {OK} is not enough: A large scale study of consent dialogs in smartphone applications

S Koch, B Altpeter, M Johns - 32nd USENIX Security Symposium …, 2023 - usenix.org
Mobile applications leaking personal information is a well established observation pre and
post GDPR. The legal requirements for personal data collection in the context of tracking are …

A US-UK usability evaluation of consent management platform cookie consent interface design on desktop and mobile

ER Bouma-Sims, M Li, Y Lin… - Proceedings of the …, 2023 - dl.acm.org
Websites implement cookie consent interfaces to obtain users' permission to use non-
essential cookies, as required by privacy regulations. We extend prior research evaluating …

Et tu, brute? Privacy analysis of government websites and mobile apps

N Samarasinghe, A Adhikari, M Mannan… - Proceedings of the ACM …, 2022 - dl.acm.org
Past privacy measurement studies on web tracking focused on high-ranked commercial
websites, as user tracking is extensively used for monetization on those sites. Conversely …

[HTML][HTML] Evolution of web tracking protection in Chrome

R Pan, A Ruiz-Martínez - Journal of Information Security and Applications, 2023 - Elsevier
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …

Who funds misinformation? A systematic analysis of the ad-related profit routines of fake news sites

E Papadogiannakis, P Papadopoulos… - Proceedings of the …, 2023 - dl.acm.org
Fake news is an age-old phenomenon, widely assumed to be associated with political
propaganda published to sway public opinion. Yet, with the growth of social media, it has …